Vulnerability Details : CVE-2015-0220
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 does not properly handle leading whitespaces, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redirect URLs, as demonstrated by a "\njavascript:" URL.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2015-0220
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-0220
0.72%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-0220
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2015-0220
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-0220
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
[SECURITY] Fedora 20 Update: python-django14-1.4.18-1.fc20
-
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
openSUSE-SU-2015:0643-1: moderate: Security update for python-Django
-
http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
openSUSE-SU-2015:1598-1: moderate: Security update for python-django
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
[SECURITY] Fedora 21 Update: python-django-1.6.10-1.fc21
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:036
mandriva.com
-
https://www.djangoproject.com/weblog/2015/jan/13/security/
Security releases issued | Weblog | DjangoExploit;Vendor Advisory
-
http://ubuntu.com/usn/usn-2469-1
USN-2469-1: Django vulnerabilities | Ubuntu security notices
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
mandriva.com
-
http://advisories.mageia.org/MGASA-2015-0026.html
Mageia Advisory: MGASA-2015-0026 - Updated python-django and python-django14 packages fix security vulnerabilities
Jump to